{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2022-50504","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-10-04T15:39:19.465Z","datePublished":"2025-10-04T15:43:53.523Z","dateUpdated":"2026-05-11T19:20:42.680Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T19:20:42.680Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/rtas: avoid scheduling in rtas_os_term()\n\nIt's unsafe to use rtas_busy_delay() to handle a busy status from\nthe ibm,os-term RTAS function in rtas_os_term():\n\nKernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b\nBUG: sleeping function called from invalid context at arch/powerpc/kernel/rtas.c:618\nin_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1, name: swapper/0\npreempt_count: 2, expected: 0\nCPU: 7 PID: 1 Comm: swapper/0 Tainted: G      D            6.0.0-rc5-02182-gf8553a572277-dirty #9\nCall Trace:\n[c000000007b8f000] [c000000001337110] dump_stack_lvl+0xb4/0x110 (unreliable)\n[c000000007b8f040] [c0000000002440e4] __might_resched+0x394/0x3c0\n[c000000007b8f0e0] [c00000000004f680] rtas_busy_delay+0x120/0x1b0\n[c000000007b8f100] [c000000000052d04] rtas_os_term+0xb8/0xf4\n[c000000007b8f180] [c0000000001150fc] pseries_panic+0x50/0x68\n[c000000007b8f1f0] [c000000000036354] ppc_panic_platform_handler+0x34/0x50\n[c000000007b8f210] [c0000000002303c4] notifier_call_chain+0xd4/0x1c0\n[c000000007b8f2b0] [c0000000002306cc] atomic_notifier_call_chain+0xac/0x1c0\n[c000000007b8f2f0] [c0000000001d62b8] panic+0x228/0x4d0\n[c000000007b8f390] [c0000000001e573c] do_exit+0x140c/0x1420\n[c000000007b8f480] [c0000000001e586c] make_task_dead+0xdc/0x200\n\nUse rtas_busy_delay_time() instead, which signals without side effects\nwhether to attempt the ibm,os-term RTAS call again."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/powerpc/kernel/rtas.c"],"versions":[{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"f413135b337c4e90c1e593c6613f8717e17bc724","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"4768935b8cc2d2afeb7956292df0f6e2c49ca0a5","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"ffa991a003abb4f8cb9e5004646bfe2d9a46912c","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"515959eb49e6d218a46979d66f36fdef329ac7d2","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"6f7e2fcab73372a371ab4017cbedf7a71f4f9b40","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"7280fdb80bf0fe35d9b799fc7009f2cbe0a397d7","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"bed48651c87bef59ea1a9d6dbc381bcbc452f4ff","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"482d990a5dd1027ee0b70a8a570d56749cac8103","status":"affected","versionType":"git"},{"version":"507279db1819aacf4022e790b3fc8bc8cf56debf","lessThan":"6c606e57eecc37d6b36d732b1ff7e55b7dc32dd4","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["arch/powerpc/kernel/rtas.c"],"versions":[{"version":"2.6.18","status":"affected"},{"version":"0","lessThan":"2.6.18","status":"unaffected","versionType":"semver"},{"version":"4.9.337","lessThanOrEqual":"4.9.*","status":"unaffected","versionType":"semver"},{"version":"4.14.303","lessThanOrEqual":"4.14.*","status":"unaffected","versionType":"semver"},{"version":"4.19.270","lessThanOrEqual":"4.19.*","status":"unaffected","versionType":"semver"},{"version":"5.4.229","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.163","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.87","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.0.17","lessThanOrEqual":"6.0.*","status":"unaffected","versionType":"semver"},{"version":"6.1.3","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.2","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"4.9.337"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"4.14.303"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"4.19.270"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"5.4.229"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"5.10.163"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"5.15.87"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"6.0.17"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"6.1.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.18","versionEndExcluding":"6.2"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/f413135b337c4e90c1e593c6613f8717e17bc724"},{"url":"https://git.kernel.org/stable/c/4768935b8cc2d2afeb7956292df0f6e2c49ca0a5"},{"url":"https://git.kernel.org/stable/c/ffa991a003abb4f8cb9e5004646bfe2d9a46912c"},{"url":"https://git.kernel.org/stable/c/515959eb49e6d218a46979d66f36fdef329ac7d2"},{"url":"https://git.kernel.org/stable/c/6f7e2fcab73372a371ab4017cbedf7a71f4f9b40"},{"url":"https://git.kernel.org/stable/c/7280fdb80bf0fe35d9b799fc7009f2cbe0a397d7"},{"url":"https://git.kernel.org/stable/c/bed48651c87bef59ea1a9d6dbc381bcbc452f4ff"},{"url":"https://git.kernel.org/stable/c/482d990a5dd1027ee0b70a8a570d56749cac8103"},{"url":"https://git.kernel.org/stable/c/6c606e57eecc37d6b36d732b1ff7e55b7dc32dd4"}],"title":"powerpc/rtas: avoid scheduling in rtas_os_term()","x_generator":{"engine":"bippy-1.2.0"}}}}